Security
Scott Borg of the U.S. Cyber Consequences Unit said that health executives must take into account the economics of security and that is more about making decisions that create value than just money.
Locky dominates the onslaught. And there has been an increase in deployment of so-called quiet malware such as remote access Trojan malware like jRAT, according to new research from PhishMe.
The number of incidents along with the number of patient records breached both slowed in October, according to Protenus. TheDarkOverLord? That cyber-perpetrator was back with two demands for ransom.
There's a lot up in the air for healthcare policy following Donald Trump's surprising win. But a complete repeal of the Affordable Care Act won't be possible – at least not initially, say two HIMSS policy experts.
Master decryption keys for the major ransomware strain Crysis were released on security blog BleepingComputer forum by a member on Monday. The user's post contained the master keys and directions on how it should be used.
Health data breaches caused by unintended disclosure are up sharply as well, according to a new report.
As outlined in HHS Office of Inspector General's 2017 work plan, the agency will also review the FDA's plan to address cybersecurity issues of medical devices.
Reliance on user IDs and passwords has put many organizations in a bad place. But more complex, secure and usable solutions exist to ensure individuals accessing a system are indeed who they say they are, says cybersecurity expert Mansur Hasib.
Hiring managers and health IT pros take note: These skillsets and job positions are the most difficult for healthcare organizations to hire for and that, in turn, can create opportunities to ramp up your career.
A sophisticated cyberattack could inhibit the new President’s initial momentum for accomplishing important campaign issues, the analyst house said.